London, England, United Kingdom Hybrid / WFH Options
IO Associates
a generous benefits package. We're looking for candidates with strong Entra and Sailpoint experience who's hands on and has experience working on IDAM/IAM/PAM projects. You'll need experience with the following: Strong experience working on IDAM/IAM/PAM projects Exposure or knowledge … role supporting Enterprise Security services, products, and architecture Good understanding of the Security frameworks such as NIST, CIS Deployment and maintenance of Privileged AccessManagement (PAM) solutions such as Cyberark, Delinea etc Deployment and support of Identity Governance and Administration (IGA) solutions such as more »
Reading, England, United Kingdom Hybrid / WFH Options
Mastek
Technical Architect – Digital Identity Location: Reading (Hybrid) SC Clearance is essential Description Mastek is delivering a major project in the secure government portfolio that requires an … experienced Technical Architect to complement the existing team. The ideal candidate will be someone with experience of delivering large scale Identityandaccessmanagement capabilities preferably in secure public sector environments. Experience and skills: · Effective decision making and the ability to understand, solve and … Takes responsible for leading the technical design of systems and services, justify and communicate design decisions · Has experience of the identityandaccessmanagement domain, including authentication protocols (OAuth, OpenID Connect and SAML) and account lifecycle · Comfortable with Java application stacks, REST API, Linux more »
software-defined network and security services. Practical experience of other Zscaler products such as ZDX, Cloud & Branch Connector, Risk360. Knowledge and understanding of Identity & AccessManagement services and understanding of identity-based, adaptive trust architectures for securing access to services. more »
must and the candidate should be proactive and self-driven, communicating effectively to non-technical stakeholders. About the Role Design, implement, and manage Identity Governance Administration solutions, assessing stakeholder needs and defining cybersecurity controls for public cloud, enterprise, and app design. Collaborate on policy enforcement, provide security reports … and support infrastructure. Specialize in SailPoint IDN, user provisioning, RBAC, and SoD. Integrate systems, customize workflows, and investigate access incidents while monitoring logs for suspicious activity, ensuring IAM security with broad IT and security expertise, implementing frameworks like ISO 27001, COBIT, and NIST, with preferred certifications in CISSP more »
Birmingham, England, United Kingdom Hybrid / WFH Options
Methods
years as a senior scrum master having led squads and multiple workstreams on infrastructure programs including hosting, networking, digital workplace, identity, andaccessmanagement 2+ years' experience within a client facing consultancy You are comfortable with Agile methodologies and frameworks (Scrum, Kanban, LeSS) and … of exciting project work that is making a difference in society Strong, inspiring and thought-provoking leadership A supportive and collaborative environment Development - access to LinkedIn Learning, a management development programme, and training Wellness - 24/7 confidential employee assistance programme Flexible Working - including home working more »
Manchester, England, United Kingdom Hybrid / WFH Options
Methods
years as a senior scrum master having led squads and multiple workstreams on infrastructure programs including hosting, networking, digital workplace, identity, andaccessmanagement 2+ years' experience within a client facing consultancy You are comfortable with Agile methodologies and frameworks (Scrum, Kanban, LeSS) and … of exciting project work that is making a difference in society Strong, inspiring and thought-provoking leadership A supportive and collaborative environment Development - access to LinkedIn Learning, a management development programme, and training Wellness - 24/7 confidential employee assistance programme Flexible Working - including home working more »
architecture and infrastructure requirements. Implement and configure Azure services, such as Virtual Machines, Virtual Networks, Storage Accounts, and Azure Active Directory. Automate deployment andmanagement processes using Infrastructure as Code (IaC) tools, such as Azure Resource Manager (ARM) templates, PowerShell, or Azure CLI. Monitor and optimize Azure infrastructure … performance, troubleshoot issues, and implement necessary enhancements. Implement and maintain robust security measures, including network security groups, access controls, and encryption mechanisms. Collaborate with development teams to streamline application deployment and support Continuous Integration/Continuous Deployment (CI/CD) pipelines. Requirements: You will possess proven work experience … and container orchestration platforms (e.g., Azure Kubernetes Service). Solid understanding of security principles and best practices in Azure, including identityandaccessmanagement, encryption, and network security. Excellent troubleshooting and problem-solving skills, with the ability to quickly identify and resolve issues in more »
involves a significant amount of stakeholder engagement; both at central and local site level, planning and execution, controls applied for planning, issue and risk management, as well as reporting on a day-to-day and key milestone/deliverable basis. It is also critical a quality-based handover … and advising on any appropriate management action (Required) Possess complex delivery and business change adoption experience Experience of IdentityandAccessManagement governance environments, challenges, and best practices Implemented large scale Identity Governance and Administration (IGA), IdentityAccessManagement (IAM) and Privileged AccessManagement (PAM) solutions and monitoring. Knowledgeable in key IAM concepts (Lifecycle and governance, Role Based access control, user provisioning, workflow and self-service management, password management, audit and compliance, single sign more »
driving revenue growth by managing and expanding our relationships with our partners. The ideal candidate will have a strong background in sales and channel management, with a strong skillset in working with people and building relationships and an eagerness to travel to partner events, both inside the UK … CyberIAM is a fast-growing, highly reputable Cyber Security Company that specialises in IdentityAccessManagementand Privileged Access Management. At CyberIAM we work with some of the largest organisations in the world ranging from Global Banks, Law Enforcement, Retail, Insurance, Telecoms … Our company starts and ends with our employees, our vendor partners, and our customers. With the best employees, designing and delivering the best Identitymanagement services to the best customers is where our passion lies. more »
Job Title: Head of IdentityandAccessManagement (IAM) Location: London Salary: £100,000 - £135,000 + Bonus + Car etc Company Overview: Our client is a leading multinational consultancy firm specializing in providing innovative solutions. With a global presence and a commitment to … navigating complex challenges and achieving their business objectives. Position Overview: Our client is seeking a dynamic and experienced Head of IdentityandAccessManagement (IAM) to join its team. The ideal candidate will be responsible for developing and implementing comprehensive IAM strategies, policies, and … aligned with business objectives and regulatory requirements. Leads the design, implementation, and maintenance of IAM systems, including identity provisioning, authentication, authorization, andaccess controls. Oversees the operation of IAM technologies, ensuring system reliability, scalability, and performance. Establishes and enforces IAM policies, standards, and procedures to mitigate more »
of architecture choices. Negotiation and conflict resolution skills. Desirable : Experience with other Zscaler products such as ZDX, Cloud & Branch Connector, Risk360. Knowledge of Identity & AccessManagement services and adaptive trust architectures. Benefits : Competitive contract rate. Opportunity to work with a leading public service broadcaster. more »
management or leadership role. Strong knowledge of cyber security principles, practices, and technologies, including network security, endpoint security, identityandaccessmanagement, and encryption. Experience with cyber security frameworks and standards (e.g., NIST Cybersecurity Framework, ISO/IEC 27001, CIS Controls). more »
a hyperscaler (cloud providers), particularly in the public cloud universe (Compute, storage, network, Kubernetes, Database as a service, Artificial Intelligence, Identityandaccessmanagement). more »
coordinating the adoption process. Experience with mobile device management (MDM) and application management concepts. Experience with identityandaccessmanagement (IAM) principles and best practices. Strong understanding of information protection and data security. Proficiency in scripting and automation using PowerShell … to multitask and manage a large and varied workload and demonstrate high levels of self-organisation. In-Depth knowledge of escalation procedures, Incident Managementand other disciplines related to Service Delivery Excellent interpersonal skills, able to effectively communicate with and influence both internal and external stakeholders, up to more »
MVP and Baseline Configurations, leveraging a deep knowledge of WAF functionalities and limitations. Providing DevSecOps pipeline maintenance support for the automation works Familiarity with IDAM protocols andaccess control measures for WAF management, informed by strong web security knowledge. Understanding of HTTPS inspection, including Termination and … Certificate management, grounded in robust web security practices. Experience in rate limiting techniques and their integration into security configurations Experience of version control and update mechanisms for WAF solutions Competency in identifying and documenting platform and organizational logging options, with a focus on security implications and cloud environments. … Experience interfacing with SOC during WAF related security incidents. General connectivity/network issue management/service management experience Networking People (UK) is acting as an Employment Business in relation to this vacancy. more »
Employment Type: Contract, Work From Home
Rate: £600 - £680 per day + Deemed Inside IR35 determination
Northampton, Northamptonshire, East Midlands, United Kingdom
Reed Technology
and implement them effectively. Manage and optimize endpoint devices, ensuring integration and security through Microsoft Endpoint Configuration Manager (MEMCM) or other modern device management tools. Implement and configure Mobile Device Management (MDM) policies using Microsoft Intune or other EMS tools. Deploy and manage applications through EMS … on mobile devices. Implement robust security measures to safeguard client data, devices, and communications, adhering to industry standards and best practices. Configure and maintain identitymanagement solutions, enforce secure user authentication, and deploy role-based access controls (RBAC). Required Skills & Qualifications: Experience in … Directory, and Conditional Access. Familiarity with mobile device management (MDM) and application management concepts. Experience with identityandaccessmanagement (IAM) principles and best practices. Strong understanding of information protection and data security. Benefits: Competitive salary package. Opportunity to work more »
Azure Integrations services, Logic Apps, Azure Functions, and Azure API management - Thorough understanding of Biztalk - Knowledge of Microsoft IdentityandAccessmanagement services. - Proven track record of successfully integrating business services using BizTalk - C# Knowledge Why this role? This role offers the more »
asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & AccessManagement, Privileged AccessManagement … per year, increasing to 30 with service (plus bank holidays). Contributory pension scheme with up to 12% company contribution. Annual medical assessments. Access to comprehensive benefits Circle Recruitment is acting as an Employment Agency in relation to this vacancy. Earn yourself a referral bonus if you refer more »
Great Yarmouth, Norfolk, East Anglia, United Kingdom
Johnson Controls
management process by ensuring replacement machines are ready for users and retiring machines are processed to completion Support IdentityandAccessManagement requests (e.g., provisioning, de-provisioning, access validation, authentication, network share, and troubleshooting) Handle UK Deskside Service Now Ticket … Handling Queues to resolve end-user issues and requests Support local IT security compliance (e.g., comms room set-up, maintenance, andaccess) as needed Maintains end-user system security by prioritizing vulnerability incidents/requests Proactively communicate and provide updates to users Support & delivery of Enterprise and Business … to foster professional growth Preferred Relevant qualification in Computer Science, Engineering, Microsoft certification or related discipline Overview of Windows subsystems such as Certificate management, Device management, regionalisation, Registry editor etc. Experience in using Service Now for IT requests/incidents Knowledge of the following technologies: iOS more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
and delivery of an integrated set of systems, whilst considering the principles and requirements of Zero Trust Architecture, Information Security, IdentityandAccessManagement, both locally and internationally Develop, maintain, and oversee integration principles, standards, policies, and procedures to ensure secure, high-quality integrations … so come be a part of our success! Best Workplace in the UK for Tech certified Low overtime culture with flexible working opportunities Access to our salary sacrifice EV Car Scheme - payments are made before tax and other contributions, so saving you money, whilst doing your bit for more »
a generous benefits package. We're looking for candidates with strong Entra and Sailpoint experience who's hands on and has experience working on IDAM/IAM/PAM projects. You'll need experience with the following: Strong experience working on IDAM/IAM/PAM projects Exposure or knowledge … role supporting Enterprise Security services, products, and architecture Good understanding of the Security frameworks such as NIST, CIS Deployment and maintenance of Privileged AccessManagement (PAM) solutions such as Cyberark, Delinea etc Deployment and support of Identity Governance and Administration (IGA) solutions such as more »
role will support the systems and applications that deliver enterprise security services for a global organisation. With a focus on identityandaccessmanagement, the Security Engineer will provide expert knowledge to support the planning, design, development, and deployment of centralized IAM and PAM … solutions and the delivery of the enterprise-level Privileged AccessManagement program. The role will also support the implementation andmanagement of all cyber security technologies and services in use at the company Role & Accountabilities KEY Identityaccessmanagement … principles of (IAM) with an in-depth knowledge in the areas of authentication and authorization systems, identity lifecycle management, andidentity governance. Build the IAM strategy, and ensure its implementation is a success across the business. Staying up-to-date on current IAM threats more »
closure of all service requests, problems and incidents that relate to IT services. This includes: End-User Computing (EUC) Application Support Email File ManagementIdentityAccessManagement Managed Print Services The primary objective of the IT Service Desk is to ensure the … Working within a matrixed team Proactive problem solver and independent thinker Can prioritise and manage a demanding and agile workload. Excellent communication and stakeholder management capability Attention to detail Ability to think laterally Resilient and positive Structured and organised Collaborative team player Proactive quick learner Flexibility to travel … puts people at the heart of their organisation, then we would love to hear from you. PIB operates a flexible working policy, and our management teams will talk to you about how that would meet both your flexible working needs and those of the business and role you more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
PowerShell. Understanding of the tactics, techniques and procedures (TTP) used by attackers. Understanding and experience of implementing and managing security controls on network access control … systems such as Firewall, IDS, WAF and network segmentation technology. Understanding and experience of technologies and concepts including Windows, Networking, IdentityandAccessManagement, Event Logging and Monitoring, Anti-virus and Zero-Touch Architecture. Life at Littlefish: Our company values shape who we are more »
Blackpool, Lancashire, North West, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identitymanagement to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity … security, and efficiency of DWPs Identity infrastructure. DWP is the UK's largest government department. We help people into work and make payments worth over £195bn a year to support some of the most vulnerable people in our society. Our DWP Digital teams are driving a once-in … what we do is extraordinary, and our purpose is unique. We'd love you to join us. Deploying World-class Platforms. The proficient Identity team oversees all aspects of internal authentication within the DWP infrastructure. The focus revolves around Active Directory/Entra ID, supplemented by various supporting more »